Cisco type 8 and 9 password hashes calculated using Java

In this article I will discuss three types of algorithms used by Cisco to calculate hashes from plain-text passwords, namely: Type 4, Type 5, Type 8 and Type 9. Back in the year 2013, the Type 4 algorithm was proven insecure because of an implementation error. The algorithm does not use PBKDF2 and does not… Continue reading Cisco type 8 and 9 password hashes calculated using Java

WalkTracker – Android application

This application will track your walks and store them on the device. It arose from own needs to track walks without the need to create an external account or link it with for example Facebook. Nevertheless you can share your track using Facebook if you like or send it via e-mail to yourself or friends.… Continue reading WalkTracker – Android application

Gouden regels voor beleggen

Dit artikel zal ingaan op enkele gouden regels die in de beleggingswereld worden toegepast. Belasting Zelf ben ik rond 1997 geïnteresseerd geraakt in beleggen. In die tijd gold in Nederland een belastingstelsel waarbij het liquide vermogen onbelast was (spaargeld) maar dat een rente van boven de 1000 gulden wel werd belast. Toen waren hoge rentes… Continue reading Gouden regels voor beleggen

Linux: Let your program run as background service

In this post you will learn how to convert your headless Linux program to a service running in the background. Here with headless is meant a program without user interaction and without graphical user interface (GUI). Assumed is that you are running a Linux distribution with Systemd enabled, like Ubuntu 15.10. In the example below,… Continue reading Linux: Let your program run as background service